Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for mobile terminal security authorization

A security and terminal application technology, applied in transmission systems, digital transmission systems, secure communication devices, etc.

Active Publication Date: 2021-09-07
XIAMEN YAXON NETWORKS CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this solution, the user management center needs to save the user ID in advance to perform authorization, and this solution can still perform authorization operations when the serial number of the application terminal cannot be known.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for mobile terminal security authorization
  • Method and system for mobile terminal security authorization
  • Method and system for mobile terminal security authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Embodiment 1 of the present invention is: a method for security authorization of a mobile terminal, the method is based on the following architecture, including a management terminal, an application terminal, and an authentication center, and the authentication center communicates with the management terminal and the application terminal respectively . Preferably, the management terminal and the application terminal are mobile phones.

[0070] Such as figure 2 As shown, the method includes the following steps:

[0071] S1: The management terminal requests a key from the authentication center.

[0072] S2: The authentication center randomly generates a plaintext and a key, and uses the key to encrypt the plaintext to obtain a ciphertext. Both the plaintext and the key are random numbers generated by the certification center, and then encrypted with an encryption algorithm to obtain ciphertext.

[0073] S3: the authentication center sends the key to the management te...

Embodiment 2

[0084] Please refer to image 3 , this embodiment is a further expansion of Embodiment 1, and the similarities will not be described again. The difference is that after the step S7, the following steps are also included:

[0085] S12: The application terminal sends its serial number and the plaintext and ciphertext obtained from the authentication center to the management terminal.

[0086] S13: The management terminal uses the key to decrypt the ciphertext.

[0087] S14: Determine whether the decrypted plaintext is consistent with the plaintext, that is, determine whether the plaintext obtained by decrypting the ciphertext obtained from the application terminal using the key obtained from the authentication center is consistent with the plaintext obtained from the application terminal, and if so, execute Step S15.

[0088] S15: Save the serial number of the application terminal.

[0089] In this embodiment, the management terminal also saves the serial number of the applic...

Embodiment 3

[0091] Please refer to Figure 5 , this embodiment is a mobile terminal security authorization system corresponding to the above embodiments, including:

[0092] Request module 1, used for the management terminal to request a key from the authentication center;

[0093] Generating module 2, used for the certification center to randomly generate plaintext and key, and use the key to encrypt the plaintext to obtain ciphertext;

[0094] The first sending module 3 is used for the authentication center to send the key to the management terminal, and send the plaintext and ciphertext to the application terminal;

[0095] The second sending module 4 is used for the management terminal to send its serial number and the key to the application terminal;

[0096] The first decryption module 5 is used for the application terminal to receive the serial number of the management terminal and the key, and use the key to decrypt the ciphertext obtained from the certification center;

[0097...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal security authorization method and system thereof, comprising: a management terminal requests a key from an authentication center; the authentication center randomly generates a plaintext and a key, and uses the key to encrypt the plaintext to obtain a ciphertext ; The authentication center sends the key to the management terminal, and sends the plaintext and ciphertext to the application terminal; the management terminal sends its serial number and the key to the application terminal; the application terminal receives the management terminal The serial number and the key, and use the key to decrypt the ciphertext obtained from the certification center; if the decrypted plaintext is consistent with the plaintext obtained from the certification center, then save the serial number. Without manually scanning or entering information such as the serial number of the application terminal on the management terminal, the management terminal can be safely and quickly granted the management and control authority for the application terminal.

Description

technical field [0001] The invention relates to the technical field of mobile terminal authorization, in particular to a method and system for mobile terminal security authorization. Background technique [0002] In the existing mobile terminal authorization technology, it is necessary to manually scan or enter information such as the serial number of the application terminal on the management terminal, in order to grant the management terminal the management and control authority for the application terminal. [0003] In the Chinese patent publication with the publication number CN101860525A, a method for realizing an electronic authorization certificate based on terminal storage is proposed, including applying for authorization, and the application authorization includes the steps: the intelligent terminal with user identification stores user identification data; The intelligent terminal sends the user identification data to the authorization system to apply for a letter o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L63/06H04L63/0892
Inventor 韩震华许水燕解玉芳张屿
Owner XIAMEN YAXON NETWORKS CO LTD